First published: Fri Aug 24 2018(Updated: )
A flaw was found in the crypto subsystem of the Linux kernel before version kernel-4.15-rc4. The "null skcipher" was being dropped when each af_alg_ctx was freed instead of when the aead_tfm was freed. This can cause the null skcipher to be freed while it is still in use leading to a local user being able to crash the system or possibly escalate privileges.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <4.15 | 4.15 |
Linux Kernel | >=4.14<4.14.8 | |
Linux Kernel | =4.15-rc1 | |
Linux Kernel | =4.15-rc2 | |
Linux Kernel | =4.15-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14619 is classified as a medium-severity vulnerability.
To fix CVE-2018-14619, upgrade your Linux kernel to version 4.15 or later.
CVE-2018-14619 affects the Linux kernel versions prior to 4.15-rc4.
CVE-2018-14619 can allow local users to potentially escalate their privileges.
Yes, CVE-2018-14619 is patched in Linux kernel version 4.15 and higher.